Analysis
-
max time kernel
152s -
max time network
155s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20231215-en -
resource tags
arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
30/12/2023, 09:52
General
-
Target
15005678e664c5976c42a3693c4925f3
-
Size
30KB
-
MD5
15005678e664c5976c42a3693c4925f3
-
SHA1
54b0cb6031f07ac9874cbad0b3562d79934e7ce7
-
SHA256
a86f11569deeeb2c67eaffa60475b6540d8eba0c6023764e1552375f6ab11a54
-
SHA512
545bd211bdeccff922ade066f2702e6d37ac2c1616dfd0642e4dc0a18c50280820d2a2f8587e60b15ccfc6b71deb6652e558ed1dca92b4b987a1953681c172c2
-
SSDEEP
768:RwMWMDcaItGROgqykcBRBDt4LeKz6ohZBWI:RwMH/lkcJDt4Ldmo7
Malware Config
Extracted
Family
mirai
Botnet
UNSTABLE
C2
cnsmaccas.duckdns.org
scanmaccas.duckdns.org
Signatures
-
Contacts a large (79738) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself a 714 15005678e664c5976c42a3693c4925f3 -
Modifies Watchdog functionality 1 TTPs 2 IoCs
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
description ioc File opened for modification /dev/watchdog File opened for modification /dev/misc/watchdog -
Writes file to system bin folder 1 TTPs 2 IoCs
description ioc File opened for modification /sbin/watchdog File opened for modification /bin/watchdog